current position：Home>What is the description of the source database restriction type in RDS MySQL synchronization to polardb MySQL Cluster?
What is the description of the source database restriction type in RDS MySQL synchronization to polardb MySQL Cluster?
2022-02-04 17:30:05 【Alibaba cloud Q & A】
RDS MySQL Sync to PolarDB MySQL What is the description of the source library restriction type in the cluster ？
Take the answer 1：
The table to be synchronized must have a primary key or unique constraint , And the field is unique , Otherwise, duplicate data may appear in the target database . For example, the synchronization object is table level , And need to edit （ Such as table column name mapping ）, Then a single synchronization task only supports synchronization 1000 A watch . When the quantity limit is exceeded , The request error will be displayed after the task is submitted , At this time, it is recommended that you split the table to be synchronized , Configure multiple tasks in batches , Or configure the synchronization task of the whole library . Binlog journal ： To be opened Binlog, For the opening method, see setting instance parameters , also binlog_format by row、binlog_row_image by full. Otherwise, an error will be prompted in the pre inspection stage , And the data synchronization task cannot be started successfully . Be careful If the source instance is self built MySQL Dual master cluster （ The two are master and slave to each other ）, To protect DTS Can get all Binlog journal , Then you need to turn on the parameter log_slave_updates. If it is an incremental synchronization task ,DTS The local address of the source database is required Binlog Log saving 24 hours , For example, full synchronization and incremental synchronization tasks ,DTS The local address of the source database is required Binlog Keep the log at least 7 Days or more （ After the full synchronization is completed, you can Binlog Save time is set to 24 hours ）, otherwise DTS May be due to inability to obtain Binlog And cause the task to fail , In extreme cases, it may even lead to data inconsistency or loss . Because of the Binlog Log save time is less than DTS The required time leads to problems , be not in DTS Of SLA Within the scope of protection .
author[Alibaba cloud Q & A],Please bring the original link to reprint, thank you.
The sidebar is recommended
- What is the authorization operation of maxcompute user management?
- What is the function of logging?
- What is the function of tracing?
- What does the Hadoop cluster environment include?
- What is the fallback operation managed by maxcompute role?
- What is the function of Java retmote debug?
- What are other SAE diagnostic tool connection instances?
- What is the empowerment operation of dataworks role management?
- What is the authorization management of ACL (object operation)?
- What is the applicable scenario of SAE end cloud joint commissioning?
guess what you like
What is the authorization operation of ACL (object operation) authorization management?
What is the role of the cloud toolkit plug-in?
What does it mean to use a data map as a data management tool?
How does Devops drive new forms?
What are the facts of OPS work?
How to set to prohibit the download of the select results of dataworks to the local?
How to set environment variables in serverless creation application?
From the perspective of enterprises, what are the four typical enterprise computing power demand models?
How to set the IP white list for accessing project?
How to reasonably set the label of the field?
- What does continuous integration (CI) mean?
- What does continuous delivery (CD) mean?
- How to set the health check in the serverless creation application?
- How to set project protection (data outflow protection mechanism)?
- What are the advantages of maxcompute?
- How to rewrite the code of linking MySQL database?
- The project saved in disk D cannot be opened in keil5. This line is displayed, and the files on the left are exclamation marks!
- java: Internal error in the mapping processor: java. lang.NullPointerException
- How can we learn software testing well?
- Java write Fibonacci sequence to find the composite number
- Why doesn't my window display? Do you have a look?
- How can protein data be redundant?
- I'm confused about if's little problem
- Why are there only two processes for building slave1 and slave2 nodes in Hadoop cluster
- Why is the elastic layout added to the parent image, and the child images in the parent image will be squeezed out
- Alipay sandbox payment after operation prompted 502 Bad Gateway
- EE308 LAB4
- I still don't quite understand string splicing. Is it applied here
- As soon as the newly bought computer x8pro enters the virtual machine, it will have a blue screen. What's the situation
- How to write this in C language, find the answer!
- Questions about full revolutionary Siamese networks for object tracking
- Find the Java code and result of this problem Define a company employee class. The attributes include name, employee number, department and the number of current employee objects. There are two construction methods
- A web calculator for cosine similarity is implemented in Django
- MySQL cannot be uninstalled. What happens??
- 18: 12:50 [MySQL] error: MySQL closed unexpectedly.
- Big guys, what about this? I'm tired
- Notepad + + every time you open a file, you have to download it again. What's the matter?
- How to solve the failure of pickit3 programming device in MPLAB x ide
- The run box does not pop up when vs runs. It can pop up in VC + + 6.0, but it is useless to press enter after entering?
- Count the number of reverse pairs in an arrangement
- Is there a board problem with vector or adjacency table?
- I, brothers, please
- C language inputs several strings into an array through scanf
- What's wrong with the operation? How to change it?
- Can the mobile phone connect to the computer hotspot access the computer LAN?
- Want to update to win11, but the lack of display is like this. What's going on?
- R language returns the position of data in the sorted array
- How to use int to define n integers and solve them
- Removing Hyper-V in Windows server2016
- Why can't I get through it all the time? It's always wrong answer